• A_Random_Idiot@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    4 months ago

    Jokes on you, cause a lot of alphabet organizations set up entry and exit nodes on Tor so you’re being tracked regardless.

    • rambling_lunatic@sh.itjust.works
      link
      fedilink
      arrow-up
      0
      ·
      4 months ago

      Most of my Tor activity is on onionsites, so that’s okay.

      Also, even given spooky nodes, the chances of getting a spooky entry and exit node are slim. Still, given the possibility, it is advisable to do spicy clearnet activities away from home with a MAC randomizer as insurance in case you win the world’s worst roulette game.

      • linearchaos@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        4 months ago

        I think the big problem I have with tor is that there’s no way to know how compromised the network is. From a three letter agency budget, setting up 30,000 nodes wouldn’t be a big deal, you just have them doing other things.

        Of course, I’m not really doing anything that would draw the ire of a three-letter agency, so even tor is overkill.

        I was also never really big on people running bad s*** through my node. I’ve always felt better using a paid proxy then at least claims not to log, Even if there’s a half decent chance that people are watching their ingress and egress at the ISP level.